Industrial cybersecurity
Solutions contextualized for Industrial Control Systems (ICS) and Operation Technology (OT)
Regardless of how industrial control systems (ICS) are connected to the Internet, or are air-gapped, malicious attacks are on the rise. Avoid attacks and recover faster from unplanned downtime with a robust GE cybersecurity plan.
GE’s cyber solutions are designed to meet all major global and local cyber standards and regulations.
Defense-in-depth
GE follows a holistic multi-layer protection concept to provide plants with better all-around, in-depth security. We safeguard your assets with defensive mechanisms on multiple levels to reduce the risk exposure if individual protection layers fail.
Our strategy
Because the threat landscape is constantly changing and evolving, our industrial cybersecurity solutions are designed and updated with a continuous improvement mindset. We recommend starting with a risk assessment and repeat assessments on an ongoing basis to adjust your protection strategy with the most effective solutions according to your risk appetite.
We can support your cybersecurity journey from scratch, or provide individual services integrated into your existing OT & IT cyber response plan. Our solutions are divided into three main stages—Assess, Protect, and Respond & Recover—and can be purchased as integrated or as standalone solutions.
Videos
With our partner Thales and their threat intelligence team, we detect and analyze cyberattacks and/or incidents in the energy sector. Below you can watch our most recent webinars on current threats and attack vectors facing the energy sector. Follow us on LinkedIn for more on-demand webinars and updates on upcoming live webinars.
Industrial control systems are providing new ways for hackers to gain access to power stations as more and more new vulnerabilities are disclosed. The energy sector is a famous target for hackers to seek financial gains and engage in sabotage or espionage. During this webinar you will get an overview of the cyber threat landscape of the energy sector. Who are the attackers? What is their motivation? Which methodologies do they use?
Attacking a nuclear power plant can lead to tremendous impacts, going far beyond disrupting operational continuity. During this webinar you will get an insight into the nuclear cyber threat landscape. By leveraging the concrete example of the 2019 Kudankulam attack in India, we demonstrate that an airgap (the power plant NOT connected to the internet) won’t necessarily protect it from being hacked.